date agreed by staff november 2015 date agreed by staff ...€¦ · date of latest update november...
TRANSCRIPT
Beeston Primary School Online Safety Policy
Date agreed by staff November 2015
Date agreed by staff February 2016 Review date February 2019
Policy written by A Farrington
E-Safety Audit:
This self-audit should be completed by the member of the Senior Leadership Team (SLT) responsible
for e-safety policy. Many staff could contribute to the audit including: Designated Child Protection
Coordinator, SENCO, Online Safety Coordinator, Headteacher.
Has the school an Online Safety Policy?
Date of latest update November 2015
The school Online safety policy was agreed by governors on: ____ November 2015
The policy is available for staff and parents, and is also on-line
The responsible member of the Senior Leadership Team is
The responsible member of the Governing Body is
The Designated Child Protection Coordinators are R.White, S. Knowles, M.Hewson
The Online Safety Coordinator is A.Farrington
Has Online safety training been provided for both pupils and staff?
Is there a clear procedure for a response to an incident of concern?
Have Online safety materials from CEOP been obtained?
Do all staff sign a Code of Conduct for ICT on appointment?
Are all pupils aware of the Schools Online Safety Rules?
Are Online safety rules displayed in all rooms where computers are used and expressed in a form that is
accessible to all pupils?
Do parents/carers sign and return an agreement that their child will comply with the School Online
Safety Rules?
Are staff, pupils, parents/carers and visitors aware that network and Internet use is closely monitored
and individual usage can be traced?
Is personal data collected, stored and used according to the principles of the Data Protection Act?
Is Internet access provided by an approved educational Internet service provider which complies with
DCSF requirements
School Online safety policy
2.1 Online safety policy
ICT in the 21st Century is seen as an essential resource to support learning and teaching, as well as playing an important role in the everyday lives of children, young people and adults. Consequently, at Beeston Primary we need to build in the use of these technologies in order to arm our young people with the skills to access life-long learning and employment.
Online safety involves pupils, staff, governors and parents making best use of technology, information, training and this policy to create and maintain a safe online and ICT environment for Beeston primary School.
This policy will operate in conjunction with other policies including those for Pupil Behaviour, Anti-bullying, Child Protection, Curriculum, Data Protection, Staff Handbook and Safe Working Practise Policy.
2.2 Roles and Responsibilities
2.2.1 Governors: Governors are responsible for the approval of the online-Safety Policy and for reviewing the
effectiveness of the policy. The role of the Online Safety Governor will include:
Regular meetings with the online -Safety Co-ordinator/Officer. Regular monitoring of online-safety incident logs. Reporting to the Teaching & Learning Committee.
2.2.2 Headteachers and Senior Leaders: The Headteacher is responsible for ensuring the safety (including online-safety) of
members of the school community, though the day-to-day responsibility for online-safety will be delegated to the online-Safety Co-ordinator.
The Headteacher/Senior Leaders are responsible for ensuring that the online-safety Coordinators and other relevant staff receive suitable CPD to enable them to carry out their online-safety roles and to train other colleagues, as relevant.
The Headteacher/Senior Leaders will ensure that there is a system in place to allow for monitoring and support of those in school who carry out the internal online-safety monitoring role. This is to provide a safety net and also support to those colleagues who take on important monitoring roles.
The Headteacher, Deputy Headteacher and Assistant Heads should be aware of the procedures to be followed in the event of a serious online-safety allegation being made against a member of staff.
2.2.3 The Online-Safety Co-ordinators:
Takes day-to day-responsibility for online-safety issues and has a leading role in establishing and reviewing the school e-safety policy/documents.
Ensures that all staff are aware of the procedures that need to be followed in the event of an online-safety incident taking place.
Has the school-level filtering been designed to reflect educational objectives
Provides training and advice for staff. Liaises with school ICT technical staff. Receives reports of online-safety incidents and creates a log of incidents to inform future
online-safety developments.
2.3 Teaching and Learning
The Internet is an essential element for education, business and social interaction. Internet use is a part of the statutory curriculum and a necessary tool for staff and pupils, and so the school has a duty to provide pupils with quality Internet access as part of their learning experience:
The school Internet access will be designed expressly for pupil use including appropriate
content filtering. Pupils will be given clear objectives for Internet use and taught what use is acceptable
and what is not. Pupils will be educated in the effective use of the Internet in research, including the skills
of knowledge location, retrieval and evaluation. As part of the new ICT (computing) curriculum, all year groups have digital literacy units
that focus on different elements of staying safe on line. These units include topics from how to use a search engine, digital footprints and cyber bullying.
The school will ensure that the use of Internet derived materials by staff and pupils complies with copyright law.
Through ICT we ensure that the school meets the needs of all, taking account of gender, ethnicity, culture, religion, language, sexual orientation, age, ability, disability and social circumstances. It is important that in this school we meet the diverse needs of pupils to ensure inclusion for all and that all pupils are prepared for full participation in a multi-ethnic society. We also measure and assess the impact regularly through meetings with our SEN co-ordinator and individual teachers to ensure all children have equal access to success in this subject.
Pupils are taught in all lessons to be critically aware of the materials/content they are shown
or access on-line and are guided to validate the accuracy before accepting the information.
2.4 Authorised Internet Access
By explicitly authorising use of the school’s Internet access pupils, staff, governors and parents are provided with information relating to online safety and agree to its use:
All staff must read and sign the ‘Acceptable ICT Use Agreement’ before using any school
ICT resource. Parents will be informed that pupils will be provided with supervised Internet access and
asked to sign and return a consent form for pupil access. Only authorised equipment, software and Internet access can be used within the school.
2.4.1 Information System Security
School ICT systems capacity and security will be reviewed regularly. Virus protection will be installed and updated regularly. Security strategies will be discussed with the service provider.
Online-safety will be discussed with our ICT support and those arrangements incorporated in to our agreement with them.
2.4.1 .1 Managing Filtering The Internet opens up new opportunities and is becoming an essential part of the everyday
world for children: learning, homework, sharing are some of the legitimate and beneficial uses. However, there are inappropriate and undesirable elements that must be managed:
If staff or pupils discover unsuitable sites, the URL (address), time and content shall be logged by the teacher who will then report to the e-Safety Coordinator who will then check the content and then request the site be blocked through (ICT4C) on-line blocking facility.
2.4.2 Published Content The school website is a valuable source of information for parents and potential parents. Contact details on the Website will be the school address, office e-mail and telephone
number. Staff and pupils’ personal information will not be published. The Headteacher will take overall editorial responsibility and ensure that content is
accurate and appropriate. The school will ensure that the use of Internet derived materials by staff and pupils
complies with copyright law.
2.4.2.1 Publishing pupil’s Images and Work • Photographs that include pupils will be selected carefully so that individual pupils cannot
be identified or their image misused. Consider using group photographs rather than full-face photos of individual children.
• Pupils full names will not be used anywhere on a school web site or other on-line space, particularly in association with photographs.
• Written permission from parents or carers will be obtained before photographs of pupils are published on the school Web site and class blogs
• Work can only be published with the permission of the pupil and parents/carers. • Pupil image file names will not refer to the pupil by name. • Parents should be clearly informed of the school policy on image taking and publishing,
both on school and independent electronic repositories 2.4.3 E-mail E-mail is a quick and easy method of communication, ensuring beneficial and appropriate
usage is an important part of e-safety:
Pupils may only use approved e-mail accounts on the school system. Pupils accounts operate on an internal mail system and is not open to the world. Pupils must immediately tell a teacher if they receive offensive e-mail. Pupils must not reveal personal details of themselves or others in e-mail communication,
or arrange to meet anyone without specific permission. The forwarding of Chain letters is not permitted Emails from unknown sources should be treated as suspicious and attachments not
opened unless the author is known. The school should consider how e-mail from pupils to external bodies is presented and
controlled. Class teachers will have access to student mailboxes should they deem it necessary they
be checked.
2.4.4 Security and passwords Passwords strength is set by ACS on our operating platform (containing both cases, number
and punctuation). Pupils and staff should never share passwords and staff must never let pupils use a staff logon. The ‘Do not share’ option should be selected. Staff must always ‘lock’ the PC if they are going to leave it unattended (the picture mute or picture freeze option on a projector will allow an image to remain on the screen and also allow a PC to be ‘locked’).
2.4.5 Social Networking Social networking Internet sites provide facilities to chat and exchange information online.
This online world is very different from the real one with the temptation to say and do things beyond usual face-to-face contact.
Use of social networking sites in the school, is not allowed and will be blocked/filtered. Pupils will be advised never to give out personal details of any kind that may identify
themselves, other pupils, their school or location. This will also include not using personal photographs and videos.
Pupils and parents will be advised that the use of social network spaces outside school carries dangers.
Pupils will be encouraged to only interact with known friends, family and staff over the Internet and deny access to others.
Parents, pupils and staff will be advised of the dangers of discussing pupils, staff or the school on social networking sites. The governors will consider taking legal action, where appropriate, to protect pupils and staff against cyber bullying and defamatory comments.
2.4.6 Managing emerging technologies
Emerging technologies will be examined for educational benefit and a risk assessment will be carried out before use in school is allowed.
The senior leadership team should note that technologies such as mobile phones with wireless Internet access can bypass school filtering systems and present a new route to undesirable material and communications. Mobile phones will not be used during lessons or formal school time.
The sending of abusive or inappropriate text messages or files by Bluetooth or any other means is forbidden.
The use by pupils of cameras in mobile phones will be kept under review. 2.4.7 Mobile Phones Many mobile phones have access to the Internet and picture and video messaging. They
present opportunities for unrestricted access to the Internet and sharing of images. UKS2 Pupils, by permission of the Headteacher, can bring mobile phones onto the school
site where it is seen by the school and parents as a safety/precautionary use. These are handed into the school office at 8:45 and collected at the end of the day.
The sending of abusive or inappropriate text messages is forbidden. Staff should always use the school phone to contact parents.
Staff, including students and visitors, is not permitted to access or use their mobile phones during lesson time or when pupils are in the classroom. All staff, visitors and volunteers should ensure that their phones are stored safely away during the teaching day.
Staff may use their mobile phones at break/lunch times in unpopulated areas.
Personal mobiles, cameras or video recorders should not be used to record classroom activities. ONLY school equipment should be used.
Photographs and recordings can only be transferred to and stored on a school computer before printing.
In the case of school productions, Parents/carers are permitted to take photographs of their own child in accordance with school protocols which strongly advise against the publication of any such photographs on Social networking sites
Adults, including Staff and Parents, cannot use mobile phones on school trips to take pictures of the children.
On trips staff mobiles are used for emergency only
2.4.8 Digital/Video Cameras/Photographs Pictures, videos and sound are not directly connected to the Internet but images are easily
transferred. Pupils will use digital cameras or video equipment only when specifically authorised by staff.
Publishing of images, video and sound will follow the policy set out in this document under ‘Publishing Content’.
Parents and carers are permitted to take photos/videos of their own children in school events. They are requested not to share photos/videos from school events on social networking sites if other pupils appear in the background.
One of the Headteachers or a nominee will inform parent(s)/guardian(s) and others present at school events that photographs/videos may be taken on the basis that they are for private retention and not for publication in any manner
Staff should always use a school camera to capture images and should not use their personal devices.
Photos taken by the school are subject to the Data Protection act.
2.5 Policy Decisions
2.5.1 Handling e-safety complaints All breaches of the online-safety policy need to be reported to the online safety
coordinator, including details of the user, date and incident. Any complaint about staff misuse must be referred to the Headteacher. Incidents which may lead to child protection issues need to be passed on to one of the
Designated Teachers immediately – it is their responsibility to decide on appropriate action.
Incidents which are not child protection issues, but may require intervention by the Online– safety co - ordinator (e.g. cyberbullying), should be reported to the co - ordinator in the same day.
Evidence of incidents must be preserved and retained. Pupils and parents will be informed of the complaints procedure and a new starter pack
will contain all relevant guidance and information. This will also be available on the school website.
The curriculum will cover how pupils should report incidents
Discussions will be held with the community police officer to establish procedures for handling potentially illegal issues.
2.5.2 Assessing Risk The school will take all reasonable precautions to prevent access to inappropriate material.
However, due to the international scale and linked Internet content, it is not possible to guarantee that unsuitable material will never appear on a school computer. The school does not accept liability for the material accessed, or any consequences of Internet access. The school will audit ICT use to establish if the online safety policy is adequate and that the implementation of the online safety policy is appropriate.
2.5 Communication
Pupils: Rules for Internet access will be posted on laptop trolleys. Pupils will be informed that Internet use will be monitored. Pupils will be informed of the importance of being safe on social networking sites. This
will be embedded across all year group, particularly during ICT lessons. All year groups look at different areas of safety through the digital literacy lessons.
Staff: All staff will be given the School online-safety Policy and its importance explained.
Staff must be informed that network and Internet traffic can be monitored and
traced to the individual user. This can include email should it be deemed
necessary by leadership that a search is required.
Staff will always use a child friendly safe search engine when accessing the
web with pupils.
Parents: Parents’ attention will be drawn to the School online-safety Policy in newsletters and on
the school Website.
The school will ask all new parents to sign the parent /pupil agreement when
they register their child with the school.
Further Resources We have found these web sites useful for online-safety advice and information.
http://www.thinkuknow.co.uk/ Set up by the Police with lots of information for parents and staff including a place to report abuse.
http://www.childnet-int.org/ Non-profit organisation working with others to “help make the Internet a great and safe place for children”.
APPENDIX A – Flowchart for responding to e-safety incidents
APPENDIX B – Internet Permission letter
Dear Parents
Responsible Use of the Internet
As part of pupil’s curriculum enhancement and the development of ICT skills, Beeston Primary School is providing
supervised access to the Internet including email.
Although there have been concerns nationally about pupils having access to undesirable materials, we are taking
positive steps to deal with this risk in school. Our school Internet access provider operates a filtering system that
restricts access to inappropriate materials, and your child will be using the Internet under supervision. Your child’s
activity on the Internet will be monitored and reported to the Headteacher on a regular basis.
Whilst every endeavour is made to ensure that suitable restrictions are in place and working effectively to prevent
children gaining access to inappropriate materials, neither the school nor the Council will be liable under any
circumstances for any injury, distress, loss or damage to the pupil or the parents, which may arise directly or indirectly
from the pupil’s use of the Internet facilities, the use of email, or from other pupils unauthorised use of those facilities or
email.
The Council cannot be held responsible for the nature of content of materials accessed through the Internet. The
Council will not be liable under any circumstances for any damage arising from your child’s use of the Internet facilities.
On the reverse of this letter are the Rules for Responsible Internet Use that we operate at Beeston Primary School,
please read through them with your child and then complete the Permission for Internet Access Slip provided and return
it to school.
Should you wish to discuss any aspects of the Internet use please telephone me to arrange an appointment.
Yours faithfully,
Mr .N Edensor
Headteacher
…………………………………………………………………………
Beeston Primary School I have read the Rules for Responsible Internet Use with my child
Name…………………………………. Class…………………
Permission for Internet Access Parent/Carer’s Permission I give permission for access to the Internet on the terms set out in the letter. I consent to the monitoring and auditing of
my child’s mail and Internet Access
Signed…………………………………………..Date…………………………
Pupil’s Agreement I agree to follow the Rules for Responsible Internet Use. I agree to the monitoring and auditing of my mail and Internet
Access
Signed…………………………………………...Date…………………………
APPENDIX C – Pupil Acceptable Use Agreement
Beeston Primary School Rules for Responsible Internet Use
The School and Council have installed computers and Internet access to help our learning. These rules will keep everyone safe and help us to be fair to others.
I will ask permission from a member of staff before using the Internet;
I will use only my own login and password, which I will not share with anyone;
I will not access other people’s files;
I will use the computers only for school work and homework;
I will not bring disks or USB sticks into school unless I have permission;
I will only email people I know, or my teacher has approved;
The messages I send will be polite and sensible;
I will not give my home address or phone number, or arrange to meet someone, unless my parent, carer or teacher has given permission;
I will never send my picture, or any other personal information to a person, unless my parent, carer or teacher has given permission;
I will never send any information e.g. the name or photograph of another person in an email or over the Internet;
To help protect other pupils and myself, I will tell a teacher if I see anything I am unhappy with or I receive messages I do not like;
I understand that the school may check my computer files and will monitor the Internet sites I visit.
I will remember to LOG OUT when I finish my session.
APPENDIX D – Acceptable Use Agreement
Staff Device Loan agreement.
Laptop Serial Number : ____________________________________________
iPad device number: Staff .
Date: _________ .
The laptop/device(s) detailed above is loaned to
____________________________________________________ for the duration of their
employment at the school subject to the following terms and the schools ICT policy. The
laptop/device must be returned to the school on ceasing to be employed at the school or if
required during a planned absence.
1. The laptop/device is for the work related use of the named member of staff to which it is issued.
2. Only software installed at the time of issue or software purchased by and licensed to The School may be installed on the machine.
3. The laptop/device remains the property of the School throughout the loan period. However
the member of staff to which it is issued, will be required to take responsibility for its care and safe keeping.
4. The laptop/device is covered by The School’s Insurance, when at home or school, providing
it is not left unattended. If left unattended for a short period in a car it is placed in a locked boot out of sight.
5. If left unattended the laptop/device should be in a locked room or secure area. 6. Due regard must be given to the security of the computer if using other forms of transport. 7. In order to ensure the schools compliance with the Data Protection Act and to avoid
breaches of confidentiality: under no circumstances should students be allowed to use the staff laptops/devices if not directly supervised by a member of staff. Staff should also be cautious when using the computer away from school particularly with files which may contain personal student data.
8. The laptop/device will be recalled from time to time for maintenance / upgrade and
monitoring. I have read and agree to the terms and conditions in this agreement. I undertake to take due care of the computer and return it when requested.
Signed:__________________________________________
Date:____________________________________________
This policy should be read in conjunction with the school’s Safeguarding Policy and Procedures (including Child Protection). All our practice and activities must be consistent and in line with the Safeguarding Policy and Procedures noted above. Any deviations from these policies and procedures should be brought to the attention of the Headteacher so that the matter can be addressed.
APPENDIX E – Protocol for the Use of Mobile Phones
Beeston Primary School Protocol for the use of Mobile Phones
Introduction
The purpose of this protocol is to inform employees of the expectations of mobile phone use during their working hours. It is intended to give staff some broad guidelines regarding appropriate use of mobile phones, in the workplace or in the course of carrying out your duties. This protocol will operate in conjunction with other policies including those for Child Protection, Staff Handbook, Safe Working Practice, Data Protection and Security. Use of mobile phones during the working day
The use of mobile phones by employees to make/receive personal calls and/or texts during the working day is discouraged for the following reasons (this list is not exhaustive) • It does not set a professional and positive example to pupils, it is disruptive and interrupts lessons • It is a nuisance/discourteous to colleagues (eg during meetings) • It is a misuse of the school/authority’s time and has the potential to impact on children’s learning Mobile phones should be stored securely within the setting during contact time with children. Mobile phones must not be used in any teaching area. Any personal calls should be directed to the school’s landline number so that a message can be relayed to the member of staff, when the member of staff is available, unless there is an emergency situation, where the message must be relayed to the employee immediately. Employees using mobile phones during breaks should be respectful of their colleagues and mobile phones should not be used in front of pupils. An increasing number of mobile phones now have built in cameras and have the capability to capture, copy and transmit images through a range of technologies and formats. Employees should not take or transmit images of pupils and colleagues on their personal mobile phone. Business use
Any employees, who have been provided with a mobile phone for business use, must ensure the mobile used is solely for this reason, unless express permission has been given that the phone can also be used for personal use. Security
Employees accessing emails using either their personal or business phones should have the appropriate secure systems in place to ensure should their phone be lost or stolen, the data cannot be accessed. Employees should be requested to sign a declaration to ensure their phone is password or pin protected. This should be signed and kept on the employee’s personal file.
Social Networking
Employees should not access social networking sites via their mobile phones (business or personal phones) during working hours. Protection of Employees
Employees should not provide parents or pupils with their personal mobile phone number. Employees should refer to the School’s Protocol for the use of texting/phoning parents where one exists.